{"url":"https://zarat.hatenablog.com/entry/2022/12/10/004323","provider_url":"https://hatena.blog","author_name":"Zarat","blog_url":"https://zarat.hatenablog.com/","height":"190","width":"100%","version":"1.0","categories":["LetsDefend","Forensics","packet"],"blog_title":"4ensiX","image_url":null,"title":"LetsDefend Challenge DFIR: Port Scan Activity writeup","description":"LetsDefend Challenge DFIR: Port Scan Activity Question1: What is the IP address scanning the environment? \u4e00\u756a\u6ca2\u5c71\u30d1\u30b1\u30c3\u30c8\u3092\u98db\u3070\u3057\u3066\u3044\u305d\u3046\u306a\u306e\u304c\u602a\u3057\u3044\uff0e $ tshark -r port\\ scan.pcap -z conv,ip -q ================================================================================ IPv4 Conversations Filter:<No Filter> | <- | | \u2026","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fzarat.hatenablog.com%2Fentry%2F2022%2F12%2F10%2F004323\" title=\"LetsDefend Challenge DFIR: Port Scan Activity writeup - 4ensiX\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","published":"2022-12-10 00:43:23","provider_name":"Hatena Blog","author_url":"https://blog.hatena.ne.jp/Zarat/"}